Publications
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
M Nosouhi, S Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, R Doss
(2023), Vol. 18, pp. 2160-2174, IEEE Transactions on Information Forensics and Security, C1
Identification of disease propagation paths in two-layer networks
G Li, G Liu, X Wu, L Pan
(2023), Vol. 13, pp. 6357-, Scientific Reports, England, C1
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance Systems
J Guan, L Pan, C Wang, S Yu, L Gao, X Zheng
(2023), pp. 1-11, IEEE Internet of Things, Piscataway, N.J., C1
Bit Flipping Key Encapsulation for the Post-Quantum Era
M Nosouhi, S Shah, L Pan, R Doss
(2023), Vol. 11, pp. 56181-56195, IEEE Access, C1
Resource-saving quantum key distribution based on three-photon matrix product states
Hong Lai, Josef Pieprzyk, Lei Pan, Ya Li
(2023), Vol. 22, pp. 1-16, Quantum Information Processing, Berlin, Germany, C1
Chengzu Dong, Jingwen Zhou, Qi An, Frank Jiang, Shiping Chen, Lei Pan, Xiao Liu
(2023), Vol. 7, pp. 1-17, Drones, Basel, Switzerland, C1
Security and privacy problems in voice assistant applications: A survey
J Li, C Chen, M Rahimi Azghadi, H Ghodosi, L Pan, J Zhang
(2023), Vol. 134, pp. 1-15, Computers and Security, Amsterdam, The Netherlands, C1
A Survey of PPG's Application in Authentication
L Li, C Chen, L Pan, L Zhang, Z Wang, J Zhang, Y Xiang
(2023), Vol. 135, pp. 103488-103488, Computers and Security, Amsterdam, The Netherlands, C1
SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems
Syed Shah, Mohammad Nosouhi, Lei Pan, Robin Doss
(2023), pp. 1-8, APKC '23 : Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, Melbourne, Vic., E1
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups
Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang
(2023), IJCNN 2023 : Proceedings of the International Joint Conference on Neural Networks, Gold Coast, Qld., E1
Cynthia Chee, Shantanu Pal, Lei Pan, Robin Doss
(2023), pp. 105-113, ASIA CCS 2023 : Proceedings of the 5th ACM Asia Conference on Computer and Communications Security, Melbourne, Victoria, E1
SigA: RPPG-based Authentication for Virtual Reality Head-mounted Display
L Li, C Chen, L Pan, L Zhang, J Zhang, Y Xiang
(2023), pp. 686-699, ACM International Conference Proceeding Series, E1
P Li, L Pan, F Chen, T Hoang, R Wang
(2023), pp. 662-665, Proceedings - 2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, E1
Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification
M Jaworsky, X Tao, J Yong, L Pan, J Zhang, S Pokhrel
(2023), Vol. 14305, pp. 115-126, HIS 2023 : Proceedings of the 12th International Conference on Health Information Science, Melbourne, Vic., E1
A Multi‐Domain Perspective of Future Directions for VANETs for Emergency Message Dissemination
Ravneet Kaur, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2022), pp. 199-218, IoT-Enabled Smart Healthcare Systems, Services and Applications, London, Eng., B1
Obfuscation-Based Mechanisms in Location-Based Privacy Protection
Basia Wozny, L Pan, A Anwar
(2022), Vol. 1025, pp. 191-211, Explainable Artificial Intelligence for Cyber Security, Cham, Switzerland, B1
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers
G Xu, X Xie, S Huang, J Zhang, L Pan, W Lou, K Liang
(2022), Vol. 19, pp. 862-878, IEEE Transactions on Dependable and Secure Computing, C1
Machine Learning based Cyber Atacks Targeting on Controlled Information: A Survey
Y Miao, C Chen, L Pan, Q Han, J Zhang, Y Xiang
(2022), Vol. 54, ACM Computing Surveys, C1
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
J Zhang, L Pan, Q Han, C Chen, S Wen, Y Xiang
(2022), Vol. 9, pp. 377-391, IEEE/CAA Journal of Automatica Sinica, Piscataway, NJ, C1
Domain adaptation for Windows advanced persistent threat detection
R Coulter, J Zhang, L Pan, Y Xiang
(2022), Vol. 112, Computers and Security, C1
Learning multi-level and multi-scale deep representations for privacy image classification
Y Han, Y Huang, L Pan, Y Zheng
(2022), Vol. 81, pp. 2259-2274, Multimedia Tools and Applications, C1
H Lai, J Pieprzyk, L Pan
(2022), Vol. 21, pp. 1-17, Quantum Information Processing, Berlin, Germany, C1
I Natgunanathan, P Praitheeshan, L Gao, Y Xiang, L Pan
(2022), Vol. 18, ACM Transactions on Multimedia Computing, Communications and Applications, C1
Cyber Code Intelligence for Android Malware Detection
Junyang Qiu, Q Han, W Luo, L Pan, S Nepal, J Zhang, Y Xiang
(2022), pp. 1-11, IEEE Transactions on Cybernetics, Piscataway, N.J., C1
Towards enhanced PDF maldocs detection with feature engineering: design challenges
A Falah, S Pokhrel, L Pan, A de Souza-Daw
(2022), pp. 1-28, Multimedia Tools and Applications, Berlin, Germany, C1
An improved quantum network communication model based on compressed tensor network states
Q Zhang, H Lai, J Pieprzyk, L Pan
(2022), Vol. 21, pp. 1-19, Quantum Information Processing, Berlin, Germany, C1
On the Design and Implementation of a Blockchain-Based Data Management System for ETO Manufacturing
Z Jing, N Hu, Y Song, B Song, C Gu, L Pan
(2022), Vol. 12, Applied Sciences (Switzerland), C1
Combining Innovative Technology and Context based Approaches in Teaching Software Engineering
S Huda, S Alyahya, L Pan, H Al-Dossari
(2022), Vol. 13, pp. 305-314, International Journal of Advanced Computer Science and Applications, C1
H Lai, J Pieprzyk, L Pan
(2022), Vol. 106, Physical Review A, C1
Digital Twin For Cybersecurity: Towards Enhancing Cyber Resilience
Rajiv Faleiro, Lei Pan, Shiva Pokhrel, Robin Ram Mohan Doss
(2022), Vol. 413, pp. 57-76, Broadnets 2021: Broadband, Communications, Networks, and Systems, Virtual Event, E1
Containers' Privacy and Data Protection via Runtime Scanning Methods
Francisco Rojo, Lei Pan
(2022), Vol. 413, pp. 37-56, BROADNETS 2021 : Proceedings of the 12th EAI International Conference 2021, Virtual Event, E1
DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems
M Nosouhi, S Shah, L Pan, R Doss
(2022), Vol. 448, pp. 3-10, AC3 2022 : Proceedings of the EAI International Conference on Applied Cryptography in Computer and Communications 2022, Virtual Event, E1
No-Label User-Level Membership Inference for ASR Model Auditing
Y Miao, C Chen, L Pan, S Liu, S Camtepe, J Zhang, Y Xiang
(2022), Vol. 13555 LNCS, pp. 610-628, ESORICS 2022 : Computer Security : Proceedings of European Symposium on Research in Computer Security 2022 symposium, Copehagen, Denmark, E1
Video is all you need: Attacking PPG-based Biometric Authentication
L Li, C Chen, L Pan, J Zhang, Y Xiang
(2022), pp. 57-66, AISec '22 : Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security 2022, Los Angeles, Calif., E1
Towards Privacy-Preserving Neural Architecture Search
F Wang, L Zhang, L Pan, S Hu, R Doss
(2022), pp. 1-6, Proceedings - 2022 IEEE Symposium on Computers and Communications, Rhodes, Greece, E1
EvAnGCN: Evolving Graph Deep Neural Network Based Anomaly Detection in Blockchain
V Patel, V Patel, S Rajasegarar, S Rajasegarar, L Pan, L Pan, J Liu, J Liu, L Zhu, L Zhu
(2022), Vol. 13725, pp. 444-456, ADMA 2022 : Proceedings of the 18th International Conference on Advanced Data Mining and Applications 2022, Brisbane, Qld., E1
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
F Heikamp, L Pan, R Trujillo-Rasua, S Ruj, R Doss
(2022), Vol. 13787, pp. 514-523, NSS 2022 : Proceedings of the 16th International Conference on Network and System Security 2022, Denarau Island, Fiji, E1
Automated Knowledge Graph Construction for Healthcare Domain
M Jaworsky, X Tao, J Yong, L Pan, J Zhang, S Pokhrel
(2022), Vol. 13705, pp. 258-265, HIS 2022 : Proceedings of the Health Information Science 11th International Conference 2022, Virtual Event, E1
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis
V Kanthuru, S Rajasegarar, P Rathore, R Doss, L Pan, B Ray, M Chowdhury, C Srimathi, M Durai
(2022), Vol. 13725, pp. 118-130, ADMA 2022 : Proceedings of the Advanced Data Mining and Applications International Conference 2022, Brisbane, Qld., E1
InstaVarjoLive: An Edge-Assisted 360 Degree Video Live Streaming for Virtual Reality Testbed
P Li, F Chen, R Wang, T Hoang, L Pan
(2022), pp. 609-613, Proceedings - 2022 18th International Conference on Mobility, Sensing and Networking, MSN 2022, ELECTR NETWORK, E1
Machine Learning-Based Online Source Identification for Image Forensics
Yonggang Huang, Lei Pan, wei Luo, Yahui Han, Jun Zhang
(2021), pp. 27-56, Cyber Security Meets Machine Learning, Singapore, B1
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases
Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Olivier De Vel, Paul Montague, Yang Xiang
(2021), Vol. 18, pp. 2469-2485, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, C1
Improving malicious PDF classifier with feature engineering: A data-driven approach
A Falah, L Pan, S Huda, S Pokhrel, A Anwar
(2021), Vol. 115, pp. 314-326, Future Generation Computer Systems, C1
R Li, X Li, J Xu, F Jiang, Z Jia, D Shao, L Pan, X Liu
(2021), Vol. 33, Concurrency and Computation: Practice and Experience, C1
A Survey of Android Malware Detection with Deep Neural Models
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang
(2021), Vol. 53, ACM Computing Surveys, C1
Data congestion in VANETs: research directions and new trends through a bibliometric analysis
T Bhatia, R Ramachandran, R Doss, L Pan
(2021), Vol. 77, pp. 6586-6628, Journal of Supercomputing, C1
The audio auditor: user-level membership inference in Internet of Things voice services
Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zhao, Dali Kaafar, Yang Xiang
(2021), Vol. 2021, pp. 209-228, Proceedings on privacy enhancing technologies, Warsaw, Poland, C1
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT
S Pokhrel, L Pan, N Kumar, R Doss, H Vu
(2021), Vol. 8, pp. 10299-10307, IEEE Internet of Things Journal, C1
Private and trustworthy distributed lending model using Hyperledger Besu
Purathani Praitheeshan, Lei Pan, Robin Ram Mohan Doss
(2021), Vol. 2, pp. 1-19, SN computer science, Cham, Switzerland, C1
The importance of selecting clustering parameters in VANETs: A survey
R Kaur, R Ramachandran, R Doss, L Pan
(2021), Vol. 40, Computer Science Review, C1
T Bhatia, R Ramachandran, R Doss, L Pan
(2021), IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), C1
Deep learning algorithms for cyber security applications: A survey
G Li, P Sharma, L Pan, S Rajasegarar, C Karmakar, N Patterson
(2021), Vol. 29, pp. 447-471, Journal of Computer Security, C1
Two types of dynamic quantum state secret sharing based on tensor networks states
H Lai, J Pieprzyk, L Pan, M Orgun
(2021), Vol. 582, Physica A: Statistical Mechanics and its Applications, C1
SolGuard: Preventing External Call Issues in Smart Contract-based Multi-Agent Robotic Systems
Purathani Praitheeshan, Lei Pan, Xi Zheng, Alireza Jolfaei, Robin Doss
(2021), Vol. 579, pp. 150-166, Information Sciences, Amsterdam, The Netherlands, C1
Tarandeep Bhatia, Ramkumar Ketti Ramachandran, Robin Doss, Lei Pan
(2021), pp. 636-642, Confluence 2021 : Proceedings of the 11th International Conference on Cloud Computing, Data Science & Engineering, Online, E1
Detecting and controlling the occurrence of data congestion in a high-density VANETs Environment
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Ram Mohan Doss, Lei Pan
(2021), pp. 42-48, Proceedings of the 2021 29th Conference of Open Innovations Association (FRUCT), Tampere, Finland, E1
On robustness of neural semantic parsers
S Huang, Z Li, L Qu, L Pan
(2021), pp. 3333-3342, EACL 2021 : Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics, Online, E1
Microwave Link Failures Prediction via LSTM-based Feature Fusion Network
Zichan Ruan, Shuiqiao Yang, Lei Pan, Xingjun Ma, Wei Luo, Marthie Grobler
(2021), pp. 1-8, IJCNN 2021 : Proceedings of the International Joint Conference on Neural Networks, Shenzhen, China, E1
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks
K Hossain, S Kamran, A Tavakoli, Lei Pan, Daniel Ma, S Rajasegarar, Chandan Karmakar
(2021), pp. 50-56, ICMLA 2021 : Proceedings of the 2021 20th IEEE International Conference on Machine Learning and Applications, Pasadena, Calif., E1
Security test MOODLE: a penetration testing case study
A Mudiyanselage, L Pan
(2020), Vol. 42, pp. 372-382, International journal of computers and applications, Abingdon, Eng., C1
Generating security questions for better protection of user privacy
A Anvari, L Pan, X Zheng
(2020), Vol. 42, pp. 329-350, International journal of computers and applications, Abingdon, Eng., C1
Privacy protection in interactive content based image retrieval
Y Huang, J Zhang, L Pan, Y Xiang
(2020), Vol. 17, pp. 595-607, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1
Data-driven cyber security in perspective-intelligent traffic analysis
Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang
(2020), Vol. 50, pp. 3081-3093, IEEE Transactions on Cybernetics, Piscataway, N.J., C1
Code Analysis for Intelligent Cyber Systems: A Data-Driven Approach
Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang
(2020), Vol. 524, pp. 46-58, Information Sciences, Amsterdam, The Netherlands, C1
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels
H Lai, J Pieprzyk, M Luo, C Zhan, L Pan, M Orgun
(2020), Vol. 19, Quantum Information Processing, C1
VoterChoice: A ransomware detection honeypot with multiple voting framework
C Keong Ng, S Rajasegarar, L Pan, F Jiang, L Zhang
(2020), Vol. 32, Concurrency and Computation: Practice and Experience, C1
M Wang, H Lai, L Pan
(2020), Vol. 63, pp. 369-387, Computers, Materials and Continua, C1
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks
M Asghar, L Pan, R Doss
(2020), Vol. 6, pp. 422-432, Digital Communications and Networks, C1
Y Tai, Y Wang, Z Wang, F Li, L Wei, L Pan, J Zhang, J Shi
(2020), Vol. 34, Concurrency Computation, C1
Gathering intelligence on student information behavior using data mining
L Pan, N Patterson, S McKenzie, S Rajasegarar, G Wood-Bradley, J Rough, W Luo, E Lanham, J Coldwell-Neilson
(2020), Vol. 68, pp. 636-658, Library Trends, C1
Software vulnerability analysis and discovery using deep learning techniques: A survey
P Zeng, G Lin, L Pan, Y Tai, J Zhang
(2020), Vol. 8, pp. 197158-197172, IEEE Access, C1
Analysis of weighted quantum secret sharing based on matrix product states
H Lai, J Pieprzyk, L Pan
(2020), Vol. 19, Quantum Information Processing, C1
A review of simulators used for VANETs: The case-study of vehicular mobility generators
T Bhatia, R Ketti Ramachandran, R Ram Mohan Doss, L Pan
(2020), SPIN 2020 Proceedings of the 7th International Conference on Signal Processing and Integrated Networks, Noida, India, E1
A survey on controlling the congestion in vehicle-to-vehicle communication
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 573-578, ICRITO 2020 : Trends and future directions : Proceedings of the IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Detection and control of data congestion in vehicular broadcast networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 1044-1049, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
A comprehensive review on the vehicular ad-hoc networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 515-520, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Security evaluation of smart contract-based on-chain Ethereum wallets
P Praitheeshan, L Pan, R Doss
(2020), Vol. 12570, pp. 22-41, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Vic., E1
Graph deep learning based anomaly detection in Ethereum blockchain network
V Patel, L Pan, S Rajasegarar
(2020), Vol. 12570, pp. 132-148, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Vic., E1
Unmasking windows advanced persistent threat execution
Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
(2020), pp. 268-276, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Opportunistic Tracking in Cyber-Physical Systems
Samaneh Rashidibajgan, Thomas Hupperich, Robin Ram Mohan Doss, Lei Pan
(2020), pp. 1672-1679, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Sentiment Analysis of News Reports in the Period of New Coronavirus
Guangjun Li, Lei Pan
(2020), pp. 1-6, CCNT 2020 : Proceedings of the 2nd International Conference on Computer, Communication and Network Technology, Chengdu, China, E1
Noise-Resistant Statistical Traffic Classification
B Wang, J Zhang, Z Zhang, L Pan, Y Xiang, D Xia
(2019), Vol. 5, pp. 454-466, IEEE Transactions on Big Data, C1
Efficient quantum private queries based on quantum key distribution with pulse-position modulation
H Lai, M Luo, Y Xu, J Pieprzyk, L Pan, J Zhang, M Orgun
(2019), Vol. 29, Laser Physics, C1
Predicting the Impact of Android Malicious Samples via Machine Learning
J Qiu, W Luo, L Pan, Y Tai, J Zhang, Y Xiang
(2019), Vol. 7, pp. 66304-66316, IEEE Access, C1
S Sathyadevan, K Achuthan, R Doss, L Pan
(2019), Vol. 7, pp. 92419-92435, IEEE Access, C1
S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan
(2019), Vol. 101, pp. 1247-1258, Future Generation Computer Systems, C1
A3CM: automatic capability annotation for android malware
Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yu Wang, Yang Xiang
(2019), Vol. 7, pp. 147156-147168, IEEE Access, Piscataway, N.J., C1
Wei Du, Qiwang Lei, Qiang He, Wei Liu, Feifei Chen, Lei Pan, Tao Lei, Hailiang Zhao
(2019), pp. 154-158, ICWS 2019 : Proceedings of the IEEE International Conference on Web Services, Milan, Italy, E1
Cyber security insights into self-proclaimed virtual world hackers
Nicholas Patterson, M Hobbs, F Jiang, L Pan
(2019), pp. 73-87, CSITEC 2019 : Proceedings of the 5th International Conference on Computer Science, Information Technology, Vienna, Austria, E1
A visualization-based analysis on classifying android malware
Rory Coulter, Lei Pan, Jun Zhang, Yang Xiang
(2019), Vol. 11806, ML4CS 2019 : Proceedings of the Second International Conference on Machine Learning for Cyber Security, Xi'an, China, E1
Data-Driven Android Malware Intelligence: A Survey
J Qiu, S Nepal, W Luo, L Pan, Y Tai, J Zhang, Y Xiang
(2019), Vol. 11806, pp. 183-202, Machine Learning for Cyber Security, Xi’an, China, E1
Attainable hacks on keystore files in ethereum wallets--a systematic analysis
Purathani Praitheeshan, Y Xin, Lei Pan, Robin Ram Mohan Doss
(2019), FNSS 2019 : Future Network Systems and Security, Melbourne, Australia, E1
Password strength estimators trained on the leaked password lists
C Schaffer, Lei Pan
(2019), Vol. 1116, pp. 219-231, ATIS 2019: Applications and Techniques in Information Security, Thanjavur, India, E1
Cloud Forensics Investigations Relationship: A Model And Instrument
Younis Al Husaini, Matthew Warren, Lei Pan, Mansoor Al Gharibi
(2019), pp. 778-788, ACIS 2019 : Security and Privacy : Proceedings of the 30th Australasian Conference on Information Systems, Perth, Western Australia, E1
Domain-adversarial graph neural networks for text classification
Man Wu, Shirui Pan, Xingquan Zhu, Chuan Zhou, Lei Pan
(2019), pp. 648-657, ICDM 2019 : Proceedings of the IEEE International Conference on Data Mining, Beijing, China, E1
Honeypot frameworks and their applications: a new framework
Chee Ng, Lei Pan, Y Xiang
(2018), Singapore, A1
Comprehensive analysis of network traffic data
Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang
(2018), Vol. 30, Concurrency and Computation: Practice and Experience, FIJI, C1
Intelligent agents defending for an IoT world: a review
R Coulter, L Pan
(2018), Vol. 73, pp. 439-458, Computers and security, Amsterdam, The Netherlands, C1
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
(2018), Vol. 14, pp. 3289-3297, IEEE transactions on industrial informatics, Piscataway, N.J., C1
Big network traffic data visualization
Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang
(2018), Vol. 77, pp. 11459-11487, Multimedia Tools and Applications, C1
H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, M Orgun
(2018), Vol. 61, Science China Information Sciences, C1
Identifying items for moderation in a peer assessment framework
S James, E Lanham, V Mak-Hau, L Pan, T Wilkin, G Wood-Bradley
(2018), Vol. 162, pp. 211-219, Knowledge-Based Systems, C1
H Lai, M Luo, J Zhang, J Pieprzyk, L Pan, M Orgun
(2018), Vol. 17, Quantum Information Processing, C1
Exploring feature coupling and model coupling for image source identification
Y Huang, L Cao, J Zhang, L Pan, Y Liu
(2018), Vol. 13, pp. 3108-3121, IEEE transactions on information forensics and security, Piscataway, N.J., C1
Object localisation through clustering unreliable ultrasonic range sensors
L Pan, X Zheng, P Kolar, S Bangay
(2018), Vol. 27, pp. 268-280, International journal of sensor networks, Olney, Eng., C1
H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun
(2018), Vol. 15, Laser Physics Letters, C1
H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun
(2018), Vol. 70, pp. 384-390, Communications in theoretical physics, Bristol, Eng., C1
Practical overview of security issues in wireless sensor network applications
H Radhappa, L Pan, J Xi Zheng, S Wen
(2018), Vol. 40, pp. 202-213, International journal of computers and applications, Abingdon, Eng., C1
Distributed detection of zero-day network traffic flows
Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang
(2018), Vol. 845, pp. 173-191, AusDM 2017 : Proceedings of the 15th Australasian Data Mining Conference 2017, Melbourne, Vic., E1
Identifying drawbacks in malicious PDF detectors
A Falah, L Pan, M Abdelrazek, R Doss
(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1
Keep calm and know where to focus: measuring and predicting the impact of Android Malware
J Qiu, W Luo, S Nepal, J Zhang, Y Xiang, L Pan
(2018), Vol. 11323, pp. 238-254, ADMA 2018: Proceedings of the 14th International Conference on Advanced Data Mining and Applications, Nanjing, China, E1
A quantitative approach to design special purpose systems to measure hacking skills
Ahmed Falah, Lei Pan, F Chen
(2018), pp. 54-61, TALE 2018 : Engineering next-generation learning : Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, Wollongong, N.S.W., E1
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, R Doss, L Pan
(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1
A literature review of inter-enterprise SOA in small and medium business communities
A Andriyanto, R Doss, L Pan, P Yustianto
(2018), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1
Cloud forensics relationship between the law enforcement and cloud service providers
Younis Al Husaini, Matthew Warren, Lei Pan
(2018), pp. 79-88, CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference, Melbourne, Victoria, E1
Fast and simple high-capacity quantum cryptography with error detection
H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, S Li, M Orgun
(2017), Vol. 7, Scientific Reports, England, C1
Visualization of big data security: a case study on the KDD99 cup data set
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
(2017), Vol. 3, pp. 250-259, Digital Communications and Networks, C1
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, H Chen, T Luan, H Bootwala, L Batten
(2017), Vol. 36, pp. 90-100, Journal of Information Security and Applications, C1
Visual representation of penetration testing actions and skills in a technical tree model
A Falah, L Pan, M Abdelrazek
(2017), pp. 1-10, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Vic., E1
Security analysis of modern mission critical android mobile applications
X zheng, L Pan, E Yilmaz
(2017), pp. 1-9, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1
Portguard - An authentication tool for securing ports in an IoT gateway
S Sathyadevan, V Vejesh, R Doss, L Pan
(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1
Online peer marking with aggregation functions
S James, L Pan, T Wilkin, L Yin
(2017), pp. 1-6, FUZZ-IEEE 2017 : IEEE International Conference on Fuzzy Systems, Naples, Italy, E1
A testbed for security analysis of modern vehicle systems
X Zheng, L Pan, H Chen, R Di Pietro, L Batten
(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding
H Lai, J Zhang, M Luo, L Pan, J Pieprzyk, F Xiao, M Orgun
(2016), Vol. 6, Scientific Reports, England, C1
Investigating security vulnerabilities in modern vehicle systems
X Zheng, L Pan, H Chen, P Wang
(2016), Vol. 651, pp. 29-40, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1
Robustness and embedding capacity enhancement in time-spread echo-based audio watermarking
I Natgunanathan, Y Xiang, L Pan, P Chen, D Peng
(2016), pp. 1536-1541, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1
The usefulness metrics of the most popular eReader used by higher education students
D Sari, E Lanham, L Pan
(2015), Vol. 12, pp. 203-212, Issues in informing science and information technology, Santa Rosa, Cailf., C1
Segregation-of-duties conflicts in the insider threat landscape: an overview and case study
S Ballesteros, L Pan, L Batten, G Li
(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1
Enhanced Twitter sentiment analysis by using feature selection and combination
A Yang, J Zhang, L Pan, Y Xiang
(2015), pp. 52-57, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1
A novel method for detecting double compressed Facebook JPEG images
C Ng, L Pan, Y Xiang
(2014), Vol. 490, pp. 191-198, Communications in Computer and Information Science, Dordrecht , Germany, B1
Privacy preserving in location data release: A differential privacy approach
P Xiong, T Zhu, L Pan, W Niu, G Li
(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1
Forensic identification of students outsourcing assignment projects from freelancer.com
M Monnik, L Pan
(2014), Vol. 490, pp. 183-190, Communications in Computer and Information Science, Berlin, Germany, B1
A Novel Method for Detecting Double Compressed Facebook JPEG Images
Allan NG, Lei Pan, Yang Xiang
(2014), pp. 191-198, Applications and Techniques in Information Security, B1-1
Privacy Preserving in Location Data Release: A Differential Privacy Approach
Ping Xiong, Tianqing Zhu, Lei Pan, Wenjia Niu, Gang Li
(2014), pp. 183-195, Lecture Notes in Computer Science, B1-1
Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com
Michael Monnik, Lei Pan
(2014), pp. 183-190, Applications and Techniques in Information Security, B1-1
Investigating Facebook groups through a random graph model
D Pallegedara, L Pan
(2014), Vol. 9, pp. 25-34, Journal of multimedia, Finland, C1
Privacy preserving collaborative filtering for KNN attack resisting
T Zhu, G Li, L Pan, Y Ren, W Zhou
(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1
L Pan, S Bangay
(2014), pp. 66-72, CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, E1
Developing a cloud computing based approach for forensic analysis using OCR
M Trojahn, L Pan, F Schmidt
(2013), pp. 59-68, IMF 2013 : Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, Nuremberg, Germany, E1
Developing an empirical algorithm for protecting text-based CAPTCHAs against segmentation attacks
L Pan, Y Zhou
(2013), pp. 1-8, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Vic., E1
Hypothesis generation and testing in event profiling for digital forensic investigations
L Batten, L Pan, N Khan
(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1
A Grobner-Shirshov Algorithm for Applications in Internet Security
A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan
(2012), Vol. 36, pp. 87-100, SOUTHEAST ASIAN BULLETIN OF MATHEMATICS, C1-1
Using hypothesis generation in event profiling for digital forensic investigations
L Pan, N Khan, L Batten
(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1
Detecting SMS-based control commands in a Botnet from infected android devices
A Nguyen, L Pan
(2012), pp. 23-27, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1
Towards a sustainable assessment strategy for digital forensic education and training
L Pan, D Hutchinson, N Khan
(2012), TALE 2012 : Proceedings of the IEEE International Conference on Teaching, Assessment and Learning for Engineering, Hong Kong, E1
A Grobner-Shirshov algorithm for applications in internet security
A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan
(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1
Image source detection : a case study on Facebook images taken by iPhones
L Pan, N Trepanic
(2011), pp. 39-46, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1
Testing Digital Forensic Software Tools Used in Expert Testimony
Lynn Batten, Lei Pan
(2010), pp. 257-278, Handbook of Research on Computational Forensics, Digital Crime, and Investigation, B1-1
Internet security applications of the Munn rings
A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan
(2010), Vol. 81, pp. 162-171, Semigroup forum, New York N.Y., C1
Dynamic addressing in wireless sensor networks without location awareness
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1
Using relationship-building in event profiling for digital forensic investigations
L Batten, L Pan
(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1
Robust performance testing for digital forensic tools
L Pan, L Batten
(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1
Robust correctness testing for digital forensic tools
L Pan, L Batten
(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1
Teaching digital forensics to undergraduate students
L Batten, L Pan
(2008), Vol. 6, pp. 54-56, IEEE security & privacy, New York, N.Y., C1
Measure of integrity leakage in live forensic context
L Pan, A Savoldi, P Gubian, L Batten
(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1
A lower bound on effective performance testing for digital forensic tools
L Pan, L Batten
(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Seattle, Washington, E1
An effective and efficient testing methodology for correctness testing for file recovery tools
L Pan, L Batten
(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1
Lease based addressing for event-driven wireless sensor networks
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1
Address reuse in wireless sensor networks
R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
R Doss, L Pan
(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
Reproducibility of digital evidence in forensic investigations
L Pan, L Batten
(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1
Funded Projects at Deakin
Other Public Sector Funding
Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.
Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang
Department of Industry, Innovation and Science
- 2022: $74,235
- 2021: $123,725
- 2019: $296,940
Graph-learning for group activity classification.
Dr Sutharshan Rajasegarar, Dr Lei Pan
CSIRO Scholarship - Commonwealth Scientific and Industrial Research Organisation
- 2021: $10,000
Industry and Other Funding
Implementation of transaction privacy protocols on Distributed Ledger systems.
Dr Lei Pan, Ms Purathani Praitheeshan
Integrated Capital Pty Ltd
- 2019: $14,500
Exploration of Algorand blockchain technologies in FinTech.
Dr Rui Wang, Dr Lei Pan
Chaining Pty Ltd
- 2022: $10,000
Other Funding Sources
Traceability and Path Authentication in Dynamic Supply Chains.
Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua, Dr Lei Pan
Cyber Security Research Centre Limited
- 2023: $45,000
- 2022: $61,921
Lightweight Continuous Authentication for Cloud Edge Integrated Platforms
Dr Zubair Baig, Dr Lei Pan, Prof Robin Ram Mohan Doss
CYBER SECURITY RESEARCH CENTRE
- 2023: $60,000
- 2022: $49,536
- 2021: $15,000
Secure and Authenticated Access to Remote Assets Within Critical Infrastructure.
Dr Zubair Baig, Dr Lei Pan, Dr Keshav Sood, Prof Robin Ram Mohan Doss
Cyber Security Research Centre Limited
- 2023: $165,000
- 2022: $111,458
Next Generation Authentication Technologies.
Prof Robin Ram Mohan Doss, Dr Lei Pan, Dr Zubair Baig
Cyber Security Research Centre Limited
- 2023: $306,250
- 2022: $216,724
Socrates: Software Security with a focus on critical technologies.
Dr Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, Dr Lennon Chang, A/Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang
Cyber Security Research Centre Limited
- 2023: $120,976
Supervisions
Zichan Ann Ruan
Thesis entitled: A Comprehensive Study on Microwave Links: through Microwave Link Security Needs to Modeling and Evaluation
Doctor of Philosophy (Information Technology), School of Information Technology
Purathani Praitheeshan
Thesis entitled: Empirical Studies of Security and Privacy on Real World Ethereum Smart Contracts
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmed Falah
Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering
Doctor of Philosophy (Information Technology), School of Information Technology
Chee Keong (Allan) Ng
Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept
Doctor of Philosophy (Information Technology), School of Information Technology
Ravneet Kaur
Thesis entitled: Emergency Message Dissemination in Vehicular Adhoc Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Tarandeep Bhatia
Thesis entitled: Data Congestion in Vehicular Ad-hoc Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Miraj Asghar
Thesis entitled: Security and Privacy for Vehicular Adhoc Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Shiju Sathyadevan
Thesis entitled: Design of a Secure Architecture for the Internet of Things.
Doctor of Philosophy (Information Technology), School of Information Technology
Agustinus Andriyanto
Thesis entitled: Service-based Reference Architecture in the Context of Inter-Enterprise Architecture
Doctor of Philosophy (Information Technology), School of Information Technology
Russul Dh. Abdul Jabar Al-Anni
Thesis entitled: Cancer Prognosis Based on Knowledge Discovery from Clinic and Biological Data Sets
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmed Abdulateef Mohammed
Thesis entitled: Robust Approaches for Face Recognition
Doctor of Philosophy (Information Technology), School of Information Technology
Purnomo Yustianto
Thesis entitled: General Framework for Service Engineering Analysis and Design
Doctor of Philosophy (Information Technology), School of Information Technology
Moutaz Alazab
Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware
Doctor of Philosophy (Information Technology), School of Information Technology